๐Ÿ”

Password Generator

Generate cryptographically strong passwords, memorable passphrases, or PINs with live entropy and crack-time estimates.

TOOLS

Generate cryptographically strong passwords, memorable passphrases, or PINs with live entropy and crack-time estimates.

Three modes: random password (8 to 128 chars with character-class controls), passphrase (3 to 10 words from a curated 250-word list with separators), and PIN (4 to 12 digits). Strength meter shows entropy in bits and estimated crack time at 10 billion guesses per second.

Disclaimer: Never reuse passwords across sites. Always enable two-factor authentication where available. Store passwords in a vetted password manager.

Password Generator 2026

Cryptographically secure password generator using crypto.getRandomValues(). Create strong random passwords, memorable passphrases, or numeric PINs. Live entropy and crack time estimates included.

Random character password with letters, numbers, and symbols. Best for accounts stored in a password manager.

Your Password
...
StrengthVery Weak
Entropy: 0.0 bitsTime to Crack: less than 1 second (at 10 billion guesses/sec)
Settings
16
2026 Password Best Practices
Length matters more than complexity

A 16-char all-lowercase password (~75 bits) is dramatically stronger than a 6-char "P@ss1!" (~31 bits). Each extra character multiplies the work an attacker has to do.

NIST 2024 guidance (SP 800-63B)

NIST no longer requires periodic rotation or composition rules (must contain number/symbol). It does recommend: minimum 15 characters, screen against breached-password lists, and allow all ASCII characters plus emoji.

Passphrases vs random strings

A 4-6 word random passphrase (correct horse battery staple) is easier for humans to remember and has 50-80 bits of entropy. Ideal for your password manager master password.

Dictionary attacks and breaches

Attackers do not brute-force letter by letter; they try billions of breached passwords (haveibeenpwned, RockYou). Never reuse a password across sites.

Use a password manager

You only need to remember one very strong master password. Let a generator + manager (Bitwarden, 1Password, KeePass) handle the rest. There is no other safe way to have unique passwords on every account.

Passwords are generated entirely in your browser and never sent to our servers. Never reuse a password across accounts, and enable two-factor authentication (2FA) on every important service.

Calculator information

How to use this calculator

  1. Choose mode: Random Password, Passphrase, or PIN.
  2. For random password, set length 8-128 characters and tick the allowed character sets: uppercase, lowercase, digits, symbols.
  3. Enable the 'avoid ambiguous characters' option (0, O, 1, l, I) if the password will be typed manually.
  4. For passphrase, pick 3-10 words from the curated wordlist and a separator (space, hyphen, dot).
  5. For PIN, set length 4-12 digits and the 'avoid sequential patterns' option (1234, 1111).
  6. Check the entropy bits indicator and crack-time estimate; aim for at least 80 bits for important accounts per NIST SP 800-63B recommendations.
  7. Tips: never screenshot a password; use a password manager (Bitwarden, 1Password) to store it.

Entropy Bits and Crack Time

H = L * log2(N) ; crack_time_seconds = 2^H / (2 * G)
  • H = total entropy (bits)
  • L = password length (characters or words)
  • N = charset size (94 for all printable ASCII, 7776 for the Diceware wordlist)
  • G = attacker guesses per second (assumed 10^10 = 10 billion/sec for offline GPU)
  • Factor of 2 in denominator: on average a password is found after half the space is searched

NIST SP 800-63B recommends a minimum of 8 characters for user-chosen passwords and 6 for machine-generated, with no forced composition rules. A 4-5 word Diceware passphrase is already strong (>50 bits).

Worked example: Compare strength of a 12-character password vs a 4-word passphrase

Given:
  • Password 1: 12 characters, charset 94 (full ASCII)
  • Password 2: 4-word passphrase from a 7776-word list
  • Attacker rate: 10^10 guesses/sec
Steps:
  1. Password 1: H = 12 * log2(94) = 12 * 6.55 = 78.6 bits.
  2. Crack time 1: 2^78.6 / (2 * 10^10) = 4.8 * 10^23 / 2 * 10^10 = 2.4 * 10^13 sec = 760,000 years.
  3. Password 2: H = 4 * log2(7776) = 4 * 12.92 = 51.7 bits.
  4. Crack time 2: 2^51.7 / (2 * 10^10) = 3.7 * 10^15 / 2 * 10^10 = 1.8 * 10^5 sec = approximately 50 hours.
  5. For 5 words: H = 64.6 bits, crack time rises to about 73 years.

Result: A 12-character random password is strong (760,000 years); a 4-word passphrase is only ~50 hours, so 5-6 words are needed for equivalence.

Frequently asked questions

Is a longer password better than a complex one?
For brute-force attackers, entropy bits is what matters, and entropy grows linearly with length but only logarithmically with charset size. Adding one character with a 94-character charset adds 6.55 bits, while adding symbols to an 8-character password adds only about 4 bits. NIST SP 800-63B recommends prioritizing length over forced complexity.
Are password managers secure?
End-to-end encrypted password managers like Bitwarden, 1Password, or KeePass are far safer than memorizing passwords or storing them in notes. The master password is the only one you have to remember and should have high entropy (>80 bits). Independent audits are available for Bitwarden (open source) and 1Password.
What entropy is needed for a banking account?
US regulators (FFIEC, OCC, CFPB) do not specify exact entropy figures, but FFIEC guidance requires multi-factor authentication for high-risk online transactions. Best practice: a password of 12+ characters with entropy >=70 bits, plus 2FA via OTP or a hardware key (FIDO2/WebAuthn). Never reuse the same password across multiple banks.
Are EFF Diceware passphrases safe?
Yes, the EFF Large wordlist (7776 words) provides 12.92 bits per word when selected with physical dice or a CSPRNG. A 6-word passphrase produces 77.5 bits, exceeding the NIST minimum recommendation. The wordlist has been filtered to avoid biased, homophonic, or short-and-easily-mistyped words.
Does this calculator save generated passwords?
No. The entire process runs in the browser via the Web Crypto API; there are no server requests and no localStorage entries for passwords. You can verify this by opening DevTools and watching the Network tab while pressing Generate. Close the tab after moving the password into your password manager.

Last updated: May 11, 2026